194
SI3000 VDSL2 User guide (CLI)

Vdsl2 c Cli User Guide

Embed Size (px)

Citation preview

  • SI3000 VDSL2

    User guide (CLI)

  • User guide (CLI)

    The Table of Contents contains 10 pages.

    The document contains 179 pages.

    Document ident. no.: KSS65250A-EDE-030

    All rights reserved.

    Technical specifications and features are binding insofar as they are specifically and expressly agreed

    upon in a written contract.

    Technical modifications possible.

  • User guide (CLI) I

    Table of contents

    1 About this document .......................................................................................................................... 1

    1.1 Purpose............................................................................................................................................. 1 1.2 Intended audience ............................................................................................................................ 1 1.3 Document organization ..................................................................................................................... 1 1.4 Conventions ...................................................................................................................................... 2

    1.4.1 Additional text marking ............................................................................................................... 2 1.4.2 Command line interface (CLI) .................................................................................................... 2

    2 Using the command-line interface .................................................................................................... 3

    2.1 Modes ............................................................................................................................................... 3 2.2 Command syntax .............................................................................................................................. 3 2.3 Parameter values .............................................................................................................................. 4 2.4 No forms ........................................................................................................................................... 4 2.5 Command completion and abbreviation ........................................................................................... 5 2.6 Help ................................................................................................................................................... 5 2.7 Special key combinations ................................................................................................................. 6 2.8 Messages ......................................................................................................................................... 6 2.9 Command logging ............................................................................................................................. 6 2.10 Changing the printout limit ................................................................................................................ 7

    2.10.1 Displaying the CLI settings ........................................................................................................ 7 2.11 Changing the system prompt ............................................................................................................ 8

    3 User management ............................................................................................................................... 8

    3.1 Understanding .................................................................................................................................. 8 3.1.1 Default users .............................................................................................................................. 8 3.1.2 User authentication .................................................................................................................... 8 3.1.3 Remote authentication dial-in user service (RADIUS) ............................................................... 9

    3.2 Default settings ................................................................................................................................. 9 3.3 Configuring local users ..................................................................................................................... 9

    3.3.1 Adding a user ............................................................................................................................. 9 3.3.2 Setting the user password ....................................................................................................... 10 3.3.3 Creating an authentication list .................................................................................................. 11 3.3.4 Assigning an authentication login list to a user ........................................................................ 11 3.3.5 Assigning the authentication list for non-configured users ...................................................... 12

    3.4 Configuring RADIUS client ............................................................................................................. 13 3.4.1 Configuring the RADIUS servers ............................................................................................. 13 3.4.2 Displaying the RADIUS client and the RADIUS server settings .............................................. 15 3.4.3 Clearing the RADIUS statistics ................................................................................................ 15 3.4.4 Displaying the RADIUS server statistics .................................................................................. 16

    4 VLAN configuration ........................................................................................................................... 16

    4.1 Understanding ................................................................................................................................ 16 4.1.1 VLAN ........................................................................................................................................ 16 4.1.2 Q-in-Q ...................................................................................................................................... 17 4.1.3 Selective Q-in-Q ....................................................................................................................... 17

    4.2 Default settings ............................................................................................................................... 17 4.2.1 VLAN ........................................................................................................................................ 17 4.2.2 Q in Q ....................................................................................................................................... 18

  • II User guide (CLI)

    4.2.3 Selective Q in Q ....................................................................................................................... 18 4.3 Configuring VLAN ........................................................................................................................... 18

    4.3.1 Configuring user ports as VLAN access .................................................................................. 18 4.3.1.1 Prerequisites ............................................................................................................................. 18 4.3.1.2 Network diagram ....................................................................................................................... 19 4.3.1.3 Data plan .................................................................................................................................. 19

    4.3.1.3.1 Configuring the Ethernet switch blade ............................................................................. 20 4.3.1.3.2 Configuring the VDSL2 blade ........................................................................................... 20 4.3.1.3.3 Displaying VDSL2 VLAN information ............................................................................... 21

    4.3.2 Configuring user ports as VLAN trunk ..................................................................................... 22 4.3.2.1 Prerequisites ............................................................................................................................. 22 4.3.2.2 Network diagram ....................................................................................................................... 23 4.3.2.3 Data plan .................................................................................................................................. 24

    4.3.2.3.1 Configuring the Ethernet switch blade ............................................................................. 24 4.3.2.3.2 Configuring the VDSL2 blade ........................................................................................... 25 4.3.2.3.3 Displaying VDSL2 VLAN information ............................................................................... 25

    4.4 Configuring Q-in-Q .......................................................................................................................... 26 4.4.1 Configuring user ports as tunnel ports ..................................................................................... 26 4.4.1.1 Prerequisites ............................................................................................................................. 26 4.4.1.2 Network diagram ....................................................................................................................... 27 4.4.1.3 Data plan .................................................................................................................................. 28

    4.4.1.3.1 Configuring the Ethernet switch blade ............................................................................. 28 4.4.1.3.2 Configuring the VDSL2 blade ........................................................................................... 29 4.4.1.3.3 Displaying VDSL2 VLAN information ............................................................................... 29

    4.4.2 Configuring user ports as stacking ports .................................................................................. 30 4.4.2.1 Prerequisites ............................................................................................................................. 30 4.4.2.2 etwork diagram ......................................................................................................................... 31 4.4.2.3 Data plan .................................................................................................................................. 32

    4.4.2.3.1 Configuring the Ethernet switch blade ............................................................................. 32 4.4.2.3.2 Configuring the VDSL2 blade ........................................................................................... 33 4.4.2.3.3 Displaying VDSL2 VLAN information ............................................................................... 33

    4.5 Configuring selective Q in Q ........................................................................................................... 34 4.5.1 Configuring user ports as selective Q-in-Q ports ..................................................................... 34 4.5.1.1 Prerequisites ............................................................................................................................. 34 4.5.1.2 Network diagram ....................................................................................................................... 35 4.5.1.3 Data plan .................................................................................................................................. 36

    4.5.1.3.1 Configuring the Ethernet switch blade ............................................................................. 36 4.5.1.3.2 Configuring the VDSL2 blade ........................................................................................... 37 4.5.1.3.3 Displaying VDSL2 VLAN information ............................................................................... 37

    5 Multicast configuration .................................................................................................................... 38

    5.1 Understanding ................................................................................................................................. 38 5.1.1 IGMP versions .......................................................................................................................... 39

    5.2 Default settings ............................................................................................................................... 39 5.3 Configuring IGMP v2 snooping ....................................................................................................... 39

    5.3.1 Prerequisites ............................................................................................................................ 39 5.3.2 Network datagram .................................................................................................................... 40 5.3.3 Data plan .................................................................................................................................. 41 5.3.3.1 Configuring the Ethernet switch blade ...................................................................................... 41 5.3.3.2 Configuring the VDSL2 blade ................................................................................................... 42

    5.4 Configuring IGMP enhanced fast leave .......................................................................................... 42 5.4.1 Prerequisites ............................................................................................................................ 43 5.4.2 Network datagram .................................................................................................................... 43 5.4.3 Data plan .................................................................................................................................. 44 5.4.3.1 Configuring the Ethernet switch blade ...................................................................................... 44

  • User guide (CLI) III

    5.4.3.2 Configuring the VDSL2 blade ................................................................................................... 45 5.5 Configuring IGMP snooping with suppression................................................................................ 45

    5.5.1 Prerequisites ............................................................................................................................ 46 5.5.2 Network datagram .................................................................................................................... 46 5.5.3 Data plan .................................................................................................................................. 47 5.5.3.1 Configuring the Ethernet switch blade ...................................................................................... 47 5.5.3.2 Configuring the VDSL2 blade ................................................................................................... 48

    5.6 Configuring IGMP multicast VLAN registration............................................................................... 49 5.6.1 Prerequisites ............................................................................................................................ 49 5.6.2 Network datagram .................................................................................................................... 50 5.6.3 Data plan .................................................................................................................................. 51 5.6.3.1 Configuring the Ethernet switch blade ...................................................................................... 51 5.6.3.2 Configuring the VDSL2 blade ................................................................................................... 52

    5.7 Configuring IGMP multicast VLAN registration for provider edge bridges (MVR-PEB) ................. 53 5.7.1.1 Prerequisites ............................................................................................................................. 53 5.7.2 Network datagram .................................................................................................................... 54 5.7.3 Data plan .................................................................................................................................. 55 5.7.3.1 Configuring the Ethernet switch blade ...................................................................................... 55 5.7.3.2 Configuring the VDSL2 blade ................................................................................................... 56

    5.8 Configuring IGMP call admission control (CAC)............................................................................. 57 5.8.1 Prerequisites ............................................................................................................................ 57 5.8.2 Network datagram .................................................................................................................... 58 5.8.3 Data plan .................................................................................................................................. 59 5.8.3.1 Configuring the Ethernet switch blade ...................................................................................... 59 5.8.3.2 Configuring the VDSL2 blade ................................................................................................... 60 5.8.4 Configuring IGMP static multicast groups ................................................................................ 60 5.8.5 Prerequisites ............................................................................................................................ 61 5.8.6 Network datagram .................................................................................................................... 61 5.8.7 Data plan .................................................................................................................................. 62 5.8.7.1 Configuring the Ethernet switch blade ...................................................................................... 62 5.8.7.2 Configuring the VDSL2 blade ................................................................................................... 63

    5.9 Configuring multicast access lists ................................................................................................... 63 5.9.1 Prerequisites ............................................................................................................................ 64 5.9.2 Network datagram .................................................................................................................... 64 5.9.3 Data plan .................................................................................................................................. 65 5.9.4 Configuring the Ethernet switch blade ..................................................................................... 65 5.9.4.1 Configuring the VDSL2 blade ................................................................................................... 66

    5.10 Configuring the standalone IGMP querier ...................................................................................... 67 5.10.1 Prerequisites ............................................................................................................................ 67 5.10.2 Network datagram .................................................................................................................... 68 5.10.3 Data plan .................................................................................................................................. 69 5.10.3.1 Configuring the Ethernet switch blade ...................................................................................... 69 5.10.3.2 Configuring the VDSL2 blade ................................................................................................... 70

    5.11 Configuring IGMP filtering............................................................................................................... 70 5.11.1 Prerequisites ............................................................................................................................ 70 5.11.2 Network datagram .................................................................................................................... 71 5.11.3 Data plan .................................................................................................................................. 72 5.11.3.1 Configuring the Ethernet switch blade ...................................................................................... 72 5.11.3.2 Configuring the VDSL2 blade ................................................................................................... 73

    6 User security configuration ............................................................................................................. 73

    6.1 Understanding ................................................................................................................................ 73 6.2 Default settings ............................................................................................................................... 75 6.3 Configuring a protected port ........................................................................................................... 75

    6.3.1 Enabling port protection ........................................................................................................... 75

  • IV User guide (CLI)

    6.3.2 Enabling mn port protection ..................................................................................................... 76 6.4 Configuring MAC source guard ...................................................................................................... 76

    6.4.1 Prerequisites ............................................................................................................................ 76 6.4.2 Network datagram .................................................................................................................... 77 6.4.2.1 Configuring the Ethernet switch blade ...................................................................................... 77 6.4.2.2 Configuring the VDSL2 blade ................................................................................................... 78 6.4.2.3 Displaying the VDSL2 MAC source guard parameters ............................................................ 78 6.4.2.4 Displaying the error-disabled detection administrative state cause ......................................... 79 6.4.2.5 Displaying the error-disabled recovery interval ........................................................................ 79 To display the error-disabled recovery interval: ..................................................................................... 79 6.4.2.6 Displaying the error-disabled interface statistics ...................................................................... 79 To display the error-disabled interface statistics: ................................................................................... 79

    6.5 Configuring DHCP Relay Agent ...................................................................................................... 79 6.5.1 Understanding .......................................................................................................................... 80 6.5.1.1 DHCP filtering ........................................................................................................................... 81 6.5.2 Default DHCP RA settings ....................................................................................................... 81 6.5.3 Displaying DHCP RA settings .................................................................................................. 81 6.5.3.1 Displaying DHCP RA global configuration and statistics .......................................................... 82 6.5.3.2 Displaying major DHCP RA interface configuration ................................................................. 82 6.5.3.3 Displaying DHCP RA parameters and statistics on the interface ............................................. 82 6.5.3.4 Displaying VLAN specfic DHCP RA parameters ...................................................................... 83 6.5.3.5 Displaying DHCP server configuration for incoming VLAN-s ................................................... 83 6.5.4 Configuring DHCP RA global settings ..................................................................................... 84 6.5.4.1 Setting default DHCP RA server for all access VLAN-s ........................................................... 84 6.5.4.2 Setting or removing different DHCP RA server for particular access VLAN ............................ 84 6.5.4.3 Enabling or disabling DHCP RA generally ............................................................................... 85 6.5.4.4 Setting DHCP RA mode to full or simplified mode ................................................................... 85 6.5.4.5 Setting DHCP RA circuit type to trusted or untrusted ............................................................... 86 6.5.4.6 Enabling or disabling insertion of option 82 .............................................................................. 86 6.5.4.7 Enabling or disabling addition of circuit ID globally .................................................................. 86 6.5.4.8 Enabling or disabling addition of remote ID globally ................................................................ 87 6.5.4.9 Keeping or removing option 82 in reply .................................................................................... 87 6.5.4.10 Enabling or disabling option 82 unicast extension ................................................................... 87 6.5.5 Configuring Interfaces .............................................................................................................. 88 6.5.5.1 Enabling processing of DHCP RA requests and replies on the interface ................................ 88 6.5.5.2 Enable processing of DHCP RA requests on the interface ...................................................... 88 6.5.5.3 Enable processing of DHCP RA replies on the interface ......................................................... 89 6.5.5.4 Disable DHCP RA on the interface ........................................................................................... 89 6.5.5.5 Setting or unconfiguring interface's circuit type ........................................................................ 89 6.5.5.6 Setting or unconfiguring insertion of option 82 on the interface ............................................... 90 6.5.5.7 Setting or unconfiguring option 82 in replies on the interface .................................................. 90 6.5.5.8 Setting or unconfiguring option 82 unicast extension on the interface ..................................... 90 6.5.5.9 Allowing or banning debugging on the interface ...................................................................... 91 6.5.5.10 Setting interface's remote-id ..................................................................................................... 91 6.5.5.11 Enabling or disabling overload protection................................................................................. 91 6.5.5.12 Setting interface's DHCP RA port throughput .......................................................................... 92

    6.6 Configuring PPPoE intermediate agent .......................................................................................... 92 6.6.1 Understanding .......................................................................................................................... 93 6.6.2 Default PPPoE IA settings ....................................................................................................... 94 6.6.3 Configuring PPPoE IA bridge parameters ............................................................................... 94 6.6.3.1 Setting PPPoE IA functionality in general................................................................................. 94 6.6.3.2 Configuring interface parameters ............................................................................................. 94 6.6.3.3 Configuring xDSL line remote ID .............................................................................................. 94 6.6.3.4 Displaying status and summary statistics of PPPoE IA ............................................................ 95 6.6.3.5 Displaying current PPPoE IA information on the specified interface ........................................ 95

  • User guide (CLI) V

    6.6.3.6 Displaying current PPPoE IA information on all interfaces ...................................................... 95 6.6.3.7 Setting PPPoE IA trusted or untrusted mode of operation ....................................................... 96

    6.7 Configuring IP Source Guard ......................................................................................................... 96 6.7.1 Understanding .......................................................................................................................... 96 6.7.2 Default IPSG settings ............................................................................................................... 96 6.7.3 General settings ....................................................................................................................... 97 6.7.3.1 Setting IPSG functionality in general ........................................................................................ 97 6.7.3.2 Storing of IPSG binding table settings ...................................................................................... 97 6.7.3.3 Specifying IPSG binding's entry limit for all interfaces ............................................................. 97 6.7.3.4 Specifying type of filtering for interfaces ................................................................................... 98 6.7.4 Configuration of interface parameters ..................................................................................... 98 6.7.4.1 Setting the interface's state ...................................................................................................... 98 6.7.4.2 Specifying IPSG binding's entry limit for interfaces .................................................................. 99 6.7.4.3 Specifying type of filtering for interfaces ................................................................................... 99 6.7.5 Displaying IPSG settings ......................................................................................................... 99 6.7.5.1 Displaying general IPSG settings on all interfaces ................................................................ 100 6.7.5.2 Displaying IPSG settings on the interface .............................................................................. 100

    7 System security configuration ....................................................................................................... 101

    7.1 Understanding .............................................................................................................................. 101 7.1.1 Remote access filtering .......................................................................................................... 101 7.1.2 Storm control .......................................................................................................................... 101

    7.2 Default settings ............................................................................................................................. 102 7.2.1 Remote access filtering .......................................................................................................... 102 7.2.2 Storm control .......................................................................................................................... 102

    7.3 Configuring remote access filtering .............................................................................................. 103 7.3.1 Creating a filtering rule ........................................................................................................... 103 7.3.2 Removing a filtering rule ........................................................................................................ 103 7.3.3 Displaying the table of filtering rules ...................................................................................... 104

    7.4 Configuring storm control.............................................................................................................. 104 7.4.1 Enabling/disabling storm control for all interfaces ................................................................. 104 7.4.2 Enabling/disabling storm control for one interface ................................................................. 104 7.4.3 Configuring threshold for all interfaces .................................................................................. 105 7.4.4 Configuring threshold for one interface .................................................................................. 105 7.4.5 Show storm control state for all interfaces ............................................................................. 105 7.4.6 Show storm control state for one interface ............................................................................ 106

    8 ACL configuration ........................................................................................................................... 106

    8.1 Configuring ACL ........................................................................................................................... 106 8.1.1 nderstanding ACL .................................................................................................................. 107 8.1.2 Configuring L2 ACL on user ports.......................................................................................... 107 8.1.2.1 Prerequisites ........................................................................................................................... 107 8.1.2.2 Network datagram .................................................................................................................. 108 8.1.2.3 Data plan ................................................................................................................................ 108

    8.1.2.3.1 Configuring the Ethernet switch blade ........................................................................... 109 8.1.2.3.2 Configuring the VDSL2 blade ......................................................................................... 109 8.1.2.3.3 Displaying VDSL2 ACL information ............................................................................... 109

    8.1.3 Configuring user ports L3-L4 ACL ......................................................................................... 110 8.1.3.1 Prerequisites ........................................................................................................................... 110 8.1.3.2 Network datagram .................................................................................................................. 111 8.1.3.3 Data plan ................................................................................................................................ 111

    8.1.3.3.1 Configuring the Ethernet switch blade ........................................................................... 112 8.1.3.3.2 Configuring the VDSL2 blade ......................................................................................... 112 8.1.3.3.3 Displaying VDSL2 ACL information ............................................................................... 112

  • VI User guide (CLI)

    9 Configuring Quality of Service ...................................................................................................... 113

    9.1 Understanding Quality of Service ................................................................................................. 113 9.2 Default QoS settings ..................................................................................................................... 114 9.3 Configuring trust zones ................................................................................................................. 114

    9.3.1 Prerequisites .......................................................................................................................... 114 9.3.2 Network datagram .................................................................................................................. 115 9.3.3 Data plan ................................................................................................................................ 116 9.3.3.1 Configuring the Ethernet switch blade .................................................................................... 116 9.3.3.2 Configuring the VDSL2 blade ................................................................................................. 116

    9.4 Configuring egress queuing using LLQ algorithm ........................................................................ 117 9.4.1 Prerequisites .......................................................................................................................... 117 9.4.2 Network datagram .................................................................................................................. 118 9.4.3 Data plan ................................................................................................................................ 118 9.4.3.1 Configuring the Ethernet switch blade .................................................................................... 119 9.4.3.2 Configuring the VDSL2 blade ................................................................................................. 119

    9.5 Configuring differentiate services: Any incoming traffic -> classified, marked to new L2 COS values and policed ........................................................................................................................ 120

    9.5.1 Prerequisites .......................................................................................................................... 120 9.5.2 Network datagram .................................................................................................................. 121 9.5.3 Data plan ................................................................................................................................ 121 9.5.3.1 Configuring the Ethernet switch blade .................................................................................... 122 9.5.3.2 Configuring the VDSL2 blade ................................................................................................. 122

    9.6 L2 traffic incoming ->some traffic dropped some redirected to new egress interface other transmitted & part shaped in downstream direction ............................................................ 123

    9.6.1 Prerequisites .......................................................................................................................... 124 9.6.2 Network datagram .................................................................................................................. 124 9.6.3 Data plan ................................................................................................................................ 124 9.6.3.1 Configuring the Ethernet switch blade .................................................................................... 125 9.6.3.2 Configuring the VDSL2 blade ................................................................................................. 125

    9.7 Part of L3 traffic interested ->some marked with L3 DSCP & policed, other passed ................... 126 9.7.1 Prerequisites .......................................................................................................................... 126 9.7.2 Network datagram .................................................................................................................. 127 9.7.3 Data plan ................................................................................................................................ 128 9.7.3.1 Configuring the Ethernet switch blade .................................................................................... 128 9.7.3.2 Configuring the VDSL2 blade ................................................................................................. 128 9.8 Typical 3ply traffic -> traffic types are recognized, marked with L3 preferred values, policed in upstream to different values if needed & shaped in downstream ........................................ 129 9.8.1 Prerequisites .......................................................................................................................... 129 9.8.2 Network datagram .................................................................................................................. 130 9.8.3 Data plan ................................................................................................................................ 131 9.8.3.1 Configuring the Ethernet switch blade .................................................................................... 131 9.8.3.2 Configuring the VDSL2 blade ................................................................................................. 131

    10 System management configuration ............................................................................................. 132

    10.1 Understanding ............................................................................................................................... 132 10.1.1 DHPC client ............................................................................................................................ 132 10.1.2 SNTP ...................................................................................................................................... 132 10.1.3 Diagnosis connectivity problems ............................................................................................ 133 10.1.4 Aging time .............................................................................................................................. 133

    10.2 Default settings ............................................................................................................................. 133 10.2.1 Traceroute .............................................................................................................................. 133 10.2.2 Aging time .............................................................................................................................. 133

    10.3 Configuring DHCP Client .............................................................................................................. 133 10.3.1 Configuring the DHCP Client ................................................................................................. 133

  • User guide (CLI) VII

    10.3.2 Configuring the network parameters ...................................................................................... 134 10.3.3 Configuring the management VLAN ID ................................................................................. 134 10.3.3.1 Displaying status of the network ............................................................................................. 134

    10.4 Configuring SNTP ......................................................................................................................... 134 10.4.1 Configuring the SNTP server ................................................................................................. 134 10.4.1.1 Displaying SNTP settings ....................................................................................................... 135

    10.5 Diagnosis connectivity problems .................................................................................................. 135 10.5.1 Displaying traceroute ............................................................................................................. 135 10.5.2 Executing ping........................................................................................................................ 135

    10.6 Managing the MAC address table ................................................................................................ 136 10.6.1 Configuring aging time ........................................................................................................... 136 10.6.1.1 Displaying the timeout for address aging ............................................................................... 136 10.6.1.2 Displaying the MAC table ....................................................................................................... 136

    11 VDSL2 interface configuration ....................................................................................................... 137

    11.1 Understanding .............................................................................................................................. 137 11.1.1 Transmit power and power spectral density .......................................................................... 138 11.1.2 Crosstalk ................................................................................................................................ 138 11.1.3 Signal-to-noise ratio (SNR) .................................................................................................... 138 11.1.4 Margin .................................................................................................................................... 138 11.1.5 Seamless rate adaptation (SRA) ........................................................................................... 138 11.1.6 Bit swapping ........................................................................................................................... 139 11.1.7 Impulse noise protection (INP) ............................................................................................... 139 11.1.8 Retransmission of packets ..................................................................................................... 141 11.1.9 Upstream power back-off (UPBO) ......................................................................................... 141 11.1.10 PSD masks ......................................................................................................................... 141 11.1.11 VDSL2 frequency profiles ................................................................................................... 142 11.1.12 VDSL2 Interoperability and ADSL2+ Backward Compatibility ............................................ 143

    11.2 Managing DSL profiles ................................................................................................................. 143 11.2.1 DSL profile parameters, descriptions and values .................................................................. 143 11.2.2 Port specific parameters, descriptions and values ................................................................ 145 11.2.3 Displaying a list of default profiles.......................................................................................... 148 11.2.4 Displaying detailed settings of a single profile ....................................................................... 148 11.2.5 Displaying interfaces with assigned DSL profiles .................................................................. 149 11.2.6 Displaying details of a DSL profile assigned to interface ....................................................... 150 11.2.7 Creating a new profile ............................................................................................................ 150 11.2.8 Modifying the DSL profile values ........................................................................................... 151 11.2.9 Modifying port specific parameters and values ...................................................................... 151

    11.3 Managing the VDSL2 interface ..................................................................................................... 151 11.3.1 Activating the interface ........................................................................................................... 151 11.3.2 Resetting the interface ........................................................................................................... 152 11.3.3 Adding a RF notch with suppressed bandwidth ..................................................................... 153 11.3.4 Configuring seamless rate adaptation (SRA) ........................................................................ 153 11.3.5 Configuring impulse noise reduction (INP) ............................................................................ 154 11.3.6 Configuring retransmission .................................................................................................... 154 11.3.7 Configuring upstream power-back-off (UPBO) ...................................................................... 155 11.3.8 Displaying the interface state ................................................................................................. 155 11.3.9 Displaying the current values of DSL line, ............................................................................. 155 11.3.10 Displaying the port performance counters .......................................................................... 156 11.3.11 Displaying the CPE vendor information .............................................................................. 157 11.3.12 Displaying the System state................................................................................................ 157 11.3.13 Displaying the firmware version .......................................................................................... 158

    11.4 Managing PSD masks .................................................................................................................. 158 11.4.1 Standardized PSD class masks ............................................................................................. 158 11.4.1.1 Assigning a PSD class mask to a specific interface ............................................................... 159

  • VIII User guide (CLI)

    11.4.2 Custom PSD masks ............................................................................................................... 159 11.4.2.1 Downstream PSD masks ........................................................................................................ 159 11.4.2.2 Upstream PSD masks ............................................................................................................ 160 11.4.2.3 Displaying detailed information of a PSD mask ..................................................................... 161 11.4.2.4 Creating a custom PSD mask ................................................................................................ 161 11.4.2.5 Modifying the frequency and max transmission power .......................................................... 162 11.4.2.6 Assigning a PSD mask to a specific interface ........................................................................ 162

    11.4.2.6.1 Displaying assigned PSD masks to all interfaces ........................................................ 162 11.4.2.6.2 Displaying a PSD mask assigned to a specific interface ............................................. 164

    12 Managing alarms and diagnostic tests ........................................................................................ 165

    12.1 Understanding ............................................................................................................................... 165 12.1.1 Alarms .................................................................................................................................... 165 12.1.2 Diagnostic tests ...................................................................................................................... 165

    12.2 Configuring the alarms .................................................................................................................. 166 12.2.1 Configuring the alarm filter ..................................................................................................... 166 12.2.1.1 Displaying the alarm filter ....................................................................................................... 166 12.2.2 Configuring the alarm severity ............................................................................................... 166 12.2.2.1 Displaying the alarm severities ............................................................................................... 167 12.2.3 Configuring the error measure activity ................................................................................... 167 12.2.4 Displaying the alarm list ......................................................................................................... 167 12.2.5 Displaying recently reported alarms ....................................................................................... 168 12.2.6 Displaying the alarm detail ..................................................................................................... 169

    12.3 Configuring the diagnostic tests .................................................................................................... 169 12.3.1 Configuring activity of a diagnostic test .................................................................................. 169 12.3.2 Configuring priority of a diagnostic test .................................................................................. 169 12.3.3 Configuring the cyclic time of a diagnostic test ...................................................................... 170 12.3.4 Displaying the diagnostic test programs ................................................................................ 170

    13 Managing DSL tests ....................................................................................................................... 171

    13.1 Understanding ............................................................................................................................... 171 13.1.1 SELT test ................................................................................................................................ 171 13.1.2 DELT test ............................................................................................................................... 171 13.1.3 OLT tests ................................................................................................................................ 171

    13.2 Starting SELT tests ....................................................................................................................... 171 13.2.1 Displaying the SELT test results ............................................................................................ 172

    13.3 Starting DELT tests ....................................................................................................................... 172 13.3.1 Displaying the DELT status results ........................................................................................ 173 13.3.2 Displaying the DELT band results .......................................................................................... 173 13.3.3 Displaying the DELT segment results .................................................................................... 174 13.3.3.1 Example for logarithmic transfer function ............................................................................... 174 13.3.3.2 Example for quiet line noise function ...................................................................................... 175 13.3.3.3 Example for signal to noise ratio function ............................................................................... 176

    13.4 Displaying OLT results .................................................................................................................. 177 13.4.1 Example for bit allocation function ......................................................................................... 177 13.4.2 Example for bit allocation function ......................................................................................... 178 13.4.3 Example for signal to noise ratio function .............................................................................. 179

  • User guide (CLI) IX

    List of figures

    Figure 3-1: An example of network with two RADIUS servers ................................................................... 13 Figure 4-1: Sample network topology for VLAN tests (access) .................................................................. 19 Figure 4-2: Sample network topology for VLAN tests (trunk) ..................................................................... 23 Figure 4-3: Sample network topology for Q-in-Q tunneling tests ............................................................... 27 Figure 4-4: Sample network topology for Q-in-Q stacking tests................................................................. 31 Figure 4-5: Sample network topology for selective Q-in-Q tests ................................................................ 35 Figure 5-1: Sample network topology for IGMP snooping tests ................................................................. 40 Figure 5-2: Sample network topology for IGMP enhanced fast leave tests ............................................... 43 Figure 5-3: Sample network topology for IGMP suppression tests ............................................................ 46 Figure 5-4: Sample network topology for MVR tests .................................................................................. 50 Figure 5-5: Sample network topology for MVR-PEB tests ......................................................................... 54 Figure 5-6: Sample network topology for IGMP CAC tests ........................................................................ 58 Figure 5-7: Sample network topology for IGMP static groups tests ........................................................... 61 Figure 5-8: Sample network topology for multicast access lists tests ........................................................ 64 Figure 5-9: Sample network topology for MVR tests .................................................................................. 68 Figure 5-10: Sample network topology for IGMP filtering test.................................................................... 71 Figure 6-1: Packet processing between protected and unprotected ports ................................................. 74 Figure 6-2: Sample network topology for MAC source guard tests............................................................ 77 Figure 6-3: Sample network topology for PPPoE Intermediate Agent ....................................................... 80 Figure 6-4: Sample network topology for PPPoE Intermediate Agent ....................................................... 93 Figure 7-1: An example of a network for remote access filter functionality .............................................. 101 Figure 8-1: Sample network topology for ACL tests ................................................................................. 108 Figure 8-2: Sample network topology for L3-L4 ACL tests ...................................................................... 111 Figure 9-1: Sample network topology for QoS trust zones tests ............................................................. 115 Figure 9-2: Sample network topology for QoSQoS egress queuing strategies tests ............................... 118 Figure 9-3: Sample network topology for differentiate services tests ...................................................... 121 Figure 9-4: Sample network topology for differentiate services tests ...................................................... 124 Figure 9-5: Sample network topology for differentiate services tests ...................................................... 127 Figure 9-6: Sample network topology for differentiate services tests in 3ply scenarios........................... 130 Figure 11-1: Error correction coding for VDSL2 ....................................................................................... 139 Figure 11-2: ITU-T G.993.2 frequency plans............................................................................................ 142

    List of tables

    Table 1-1: Document organization ............................................................................................................... 1 Table 1-2: Conventions for text marking ...................................................................................................... 2 Table 1-3: Conventions for CLI text formatting............................................................................................. 2 Table 1-4: Conventions for keyboard shortcuts usage in CLI ...................................................................... 2 Table 2-1: CLI command modes .................................................................................................................. 3 Table 2-2: CLI command modes: access and exit ....................................................................................... 3 Table 2-3: Common parameter values ......................................................................................................... 4 Table 2-4: Special key combinations ............................................................................................................ 6 Table 2-5: CLI error messages ..................................................................................................................... 6 Table 3-1: Default RADIUS settings ............................................................................................................. 9 Table 4-1: Example of selective Q-in-Q assign table ................................................................................. 17 Table 4-2: Default VLAN settings ............................................................................................................... 17 Table 4-3: Default Q in Q settings .............................................................................................................. 18

  • X User guide (CLI)

    Table 4-4: Default selective Q-in-Q settings ............................................................................................... 18 Table 4-5: VLAN data plan ......................................................................................................................... 19 Table 4-6: VLAN data plan ......................................................................................................................... 24 Table 4-7: VLAN data plan ......................................................................................................................... 28 Table 4-8: VLAN data plan ......................................................................................................................... 32 Table 4-9: VLAN data plan ......................................................................................................................... 36 Table 5-1: Default IGMP snooping settings ................................................................................................ 39 Table 5-2: IGMP snooping data plan .......................................................................................................... 41 Table 5-3: Enhanced fast leave data plan .................................................................................................. 44 Table 5-4: IGMP suppression data plan ..................................................................................................... 47 Table 5-5: MVR data plan ........................................................................................................................... 51 Table 5-6: MVR-PEB data plan .................................................................................................................. 55 Table 5-7: IGMP CAC data plan ................................................................................................................. 59 Table 5-8: IGMP static group data plan ...................................................................................................... 62 Table 5-9: Multicast access list data plan ................................................................................................... 65 Table 5-10: Standalone IGMP querier data plan ........................................................................................ 69 Table 5-11: IGMP filtering data plan ........................................................................................................... 72 Table 6-1: Example showing communication between protected/unprotected ports A and B ................... 74 Table 6-2: Default protected port and management port protection settings ............................................. 75 Table 6-3: Default DHCP RA settings ........................................................................................................ 81 Table 6-4: Default DHCPR settings ............................................................................................................ 94 Table 6-5: Default IPSG settings ................................................................................................................ 96 Table 7-1: Default Remote access filtering settings ................................................................................. 102 Table 7-2: Default Storm control settings ................................................................................................. 102 Table 8-1: L2 ACL data plan ..................................................................................................................... 108 Table 10-1: Default traceroute settings .................................................................................................... 133 Table 10-2: Default aging time settings .................................................................................................... 133 Table 11-1: VDSL2 Profiles ...................................................................................................................... 142 Table 11-2: DSL profile parameters, descriptions and values.................................................................. 143 Table 11-3: Port specific parameters, descriptions and values ................................................................ 145 Table 12-1: List of on-line diagnostic tests ............................................................................................... 165

  • User guide (CLI) 1

    1 About this document

    1.1 Purpose

    This document describes command-line interface (CLI) commands you use to view, configure and

    manage the VDSL2 blade. You can access the CLI by using a direct connection to the serial port or by

    using telnet or SSH over a remote network connection.

    1.2 Intended audience

    This document is intended for administrators who configure and manage the VDSL2 blade using the

    command-line interface (CLI).

    1.3 Document organization

    Table 1-1: Document organization

    Chapter Describes

    Using the command-line

    interface

    the Iskratel command line interface (CLI) that you can use to configure the

    VDSL2 blade.

    User management

    the authentication of locally configured users and users that are configured on the RADIUS server.

    VLAN configuration

    how to configure VLAN, including all configuration guides are shown as

    Iskratel MSAN system, consisting of VDSL2 and Ethernet switch blade.

    Multicast configuration

    how to configure the Internet Group Management Protocol (IGMP)

    snooping on the VDSL blade, including all its features, like MVR, MPMM,

    Iskratel Fast leave and others. All the configuration guides are shown as

    the Iskratel MSAN system, consisting of the VDSL2 and the Ethernet

    switch blade.

    User security configuration

    how to configure port protection and management port protection on the

    VDSL2 blade.

    System security

    configuration how to configure remote access filtering on the VDSL2 blade

    ACL configuration

    how to configure ACL. All configuration guides are shown as Iskratel

    MSAN system, consisting of VDSL2 and Ethernet switch blade.

    QoS configuration how to configure Quality of Service (QoS) mechanisms.

    System management

    configuration

    how to manage the system configuration.

    VDSL2 interface configuration how to set or obtain the VDSL2 interface configuration.

    Managing alarms and

    diagnostic tests how to configure alarms and diagnostic test programs.

    Managing DSL tests how to manage DSL on demand tests (ODOLT) SELT and DELT and DSL online

    tests (OLT).

  • 2 User guide (CLI)

    1.4 Conventions

    1.4.1 Additional text marking

    Table 1-2: Conventions for text marking

    Sign Text Description

    Warning The sign draws attention to a text that must be read and considered in order to

    avoid harmful consequences.

    Note The sign draws attention to an additional explanation.

    1.4.2 Command line interface (CLI)

    Table 1-3: Conventions for CLI text formatting

    Format Description

    bold Elements of the application windows: window and dialog box titles, menus, data fields,

    buttons, tabs...

    courier new Command line text in general.

    courier new Command you must enter in command line interface (CLI).

    screen Information that the system displays on the screen.

    < > Indicates that you must enter a value in place of the brackets and text inside them.

    [ ] Indicates an optional parameter that you can enter in place of the brackets and text inside

    them.

    { } Indicates that you must select a parameter from the list of choices.

    | Separates the mutually exclusive choices.

    [{ }] Indicates a choice within an optional element.

    Table 1-4: Conventions for keyboard shortcuts usage in CLI

    Format Description

    DEL or Backspace Delete previous character

    Ctrl-A Go to beginning of line

    Ctrl-E Go to end of line

    Ctrl-Z Return to root command prompt

    Tab, Command-line completion

    Exit Go to next lower command prompt

    ? List available commands, keywords, or parameters

  • User guide (CLI) 3

    2 Using the command-line interface

    This chapter describes the Iskratel command line interface (CLI) that you can use to configure the VDSL2

    blade.

    CLI is divided into several modes. The commands available depend on which mode you are currently in.

    2.1 Modes

    The commands are grouped into modes according to the command function. To list commands available

    in an individual mode, enter a question mark (?) at a system prompt.

    The command prompt changes in each command mode to help you identify the current mode. The first

    part of the prompt is adjustable and can be changed (see Changing the system prompt). In this user

    guide, the system prompt used is EV.

    Table 2-1 describes the command modes and the prompts visible in that mode. There are present only

    common modes; additional modes can be added, because of CLI extensibility.

    Table 2-1: CLI command modes

    Mode Prompt Description

    enable mode EV# Allows you to issue any command, and

    any show commands (with secure

    functions also), enter the VLAN mode,

    or enter the configuration mode.

    configuration

    mode

    EV(Config)# Groups general setup commands and

    permits you to make modifications to the

    running configuration.

    VLAN mode EV(Vlan)# Groups all the VLAN commands.

    insterface mode EV(Interface )# Allows you to enable or modify the

    operation of the interface.

    Table 2-2 explains how to enter or exit each mode.

    Table 2-2: CLI command modes: access and exit

    Mode Access the mode Exit the mode

    configuration From the enable mode, enter

    configure.

    To exit to the enable mode, enter exit,

    or press Ctrl-Z.

    VLAN From the enable mode, enter vlan

    database.

    To exit to the enable mode, enter exit,

    or press Ctrl-Z.

    interface From the configuration mode, enter interface

    To exit to the configuration mode, enter

    exit. To return to the enable mode,

    enter Ctrl-Z..

    2.2 Command syntax

    A command is one or more words that might be followed by one or more parameters. Parameters can be

    required or optional values.

    Some commands, such as show network or clear vlan, do not require parameters. Other commands,

    such as network parms, require that you supply a value after the command. You must type the

    parameter values in a specific order, and optional parameters follow required parameters.

  • 4 User guide (CLI)

    The following example describes the network parms command syntax:

    network parms [gateway]

    network parms is the command name. and are parameters and represent required values that you must enter after

    you type the command keywords.

    [gateway] is an optional parameter, so you are not required to enter a value in place of the parameter.

    2.3 Parameter values

    Parameter values might be names (strings) or numbers. To use spaces as part of a name parameter,

    enclose the name value in double quotes. For example, the expression System Name with Spaces forces the system to accept the spaces. Empty strings () are not valid user-defined strings. Table 2-3 describes common parameter values and value formatting.

    Table 2-3: Common parameter values

    Parameter Description

    ipaddr This parameter is a valid IP address. You can enter the IP address in the following formats: a (32 bits) a.b (8.24 bits) a.b.c (8.8.16 bits) a.b.c.d

    (8.8.8.8) In addition to these formats, the CLI accepts decimal, hexadecimal and octal formats through the following input formats (where n is any valid hexadecimal, octal or decimal number): 0xn (CLI assumes hexadecimal format)

    0n (CLI assumes octal format with leading zeros) n (CLI assumes decimal

    format)

    macaddr The MAC address format is six hexadecimal numbers separated by colons, for example 00:06:29:32:81:40.

    areaid Enter area IDs in dotted-decimal notation (for example, 0.0.0.1). An area ID of 0.0.0.0 is reserved for the backbone. Area IDs have the same format as IP addresses but are distinct from IP addresses. You can use the IP network number of the sub-netted network for the area ID.

    routerid Enter the value of in dotted-decimal notation, such as 0.0.0.1. A

    router ID of 0.0.0.0 is invalid.

    Interface or slot/port

    Valid slot and port number separated by forward slashes. For example, 0/1 represents slot number 0 and port number 1.

    logical Interface Represents a logical slot and port number. This is applicable in the case of a port-channel (LAG). You can use the logical slot/port to configure the port-channel.

    character strings Use double quotation marks to identify character strings, for example, System Name with Spaces. An empty string () is not valid.

    2.4 No forms

    The no keyword is a specific form of an existing command and does not represent a new or distinct

    command. Almost every configuration command has a no form. In general, use the no form to reverse

    the action of a command or reset a value back to the default. For example, the no shutdown

    configuration command reverses the shutdown of an interface. Use the command without the keyword no

    to re-enable a disabled feature or to enable a feature that is disabled by default.

    Note:. Only the configuration commands are available in the no form.

  • User guide (CLI) 5

    2.5 Command completion and abbreviation

    Command completion finishes spelling the command when you type enough letters of a command to

    uniquely identify the command keyword. Once you have entered enough letters, press the SPACEBAR

    or TAB key to complete the word.

    Command abbreviation allows you to execute a command when you have entered there are enough

    letters to uniquely identify the command. You must enter all of the required keywords and parameters

    before you enter the command

    2.6 Help

    Enter a question mark (?) at the command prompt to display the commands available in the current

    mode.

    (EV)#?

    help Display help for various special keys.

    logout Exit this session. Any unsaved changes are lost.

    ping Send ICMP echo packets to a specified IP address.

    quit Exit this session. Any unsaved changes are lost.

    show Display Switch Options and Settings.

    telnet Telnet to a remote host.

    Enter a question mark (?) after each word you enter to display available command keywords or

    parameters.

    If the help output shows a parameter in angle brackets, you must replace the parameter with a value.

    (EV)# network parms ?

    Enter the IP Address.

    If there are no additional command keywords or parameters, or if additional parameters are optional, the

    following message appears in the output:

    Press Enter to execute the command

    You can also enter a question mark (?) after typing one or more characters of a word to list the available

    command or parameters that begin with the letters, as shown in the following example:

    (EV)# show m?

    mac-addr-table mac-address-table monitor

  • 6 User guide (CLI)

    2.7 Special key combinations

    Table 2-4 describes the key combinations you can use to edit commands or increase the speed of

    command entry. You can access this list from the CLI by entering help from enable mode.

    Table 2-4: Special key combinations

    Key sequence Description

    DEL or Backspace Delete previous character

    Ctrl-A Go to beginning of line

    Ctrl-E Go to end of line

    Ctrl-Z Return to root command prompt

    Tab, Command-line completion

    Exit Go to next lower command prompt

    ? List available commands, keywords, or parameters

    2.8 Messages

    If you enter a command and the system is unable to execute it, an error message appears. Table 2-5

    describes the most common CLI error messages.

    Table 2-5: CLI error messages

    Message text Description

    % Invalid input detected at '^' marker. Indicates that you entered an incorrect or

    unavailable command. The caret (^) shows

    where the invalid text is detected. This

    message also appears if any of the

    parameters or values are not recognized.

    Command not found / Incomplete command. Use

    ? to list commands.

    Indicates that you did not enter the required

    keywords or values.

    Ambiguous command Indicates that you did not enter enough

    letters to uniquely identify the command.

    2.9 Command logging

    This operation enables logging of the CLI commands. It logs all CLI commands issued on the system.

    Note: To disable the command logging, use the no form of the command.

    To enable command logging:

    Step Mode Command Purpose

    1 (EV)# configure Enter configuration mode.

    2 (EV)(Config)# logging cli-command Enable CLI command

    logging.

  • User guide (CLI) 7

    Example:

    (EV)# configure

    (EV)(Config)# logging cli-command

    (EV)(Config)# exit

    (EV)# show cli

    CLI settings:

    command logging : enabled

    printout limit : 25

    2.10 Changing the printout limit

    This operation changes the limit of printout lines on the display. The default setting is 25 lines.

    To change the printout limit:

    Step Mode Command Purpose

    1 (EV)# configure Enter configuration mode.

    2 (EV)(Config)# cli printout-limit Change the printout limit.

    Example:

    (EV)# configure

    (EV)(Config)# cli printout-limit 30

    (EV)(Config)# exit

    (EV)# show cli

    CLI settings:

    command logging : enabled

    printout limit : 30

    2.10.1 Displaying the CLI settings

    This operation displays the status of command logging and the printout limit settings.

    To display CLI settings:

    Step Mode Command Purpose

    1 (EV)# show cli Display CLI settings.

    Example:

    (EV)# show cli

    CLI settings:

    command logging : enabled

    printout limit : 30

  • 8 User guide (CLI)

    2.11 Changing the system prompt

    This operation changes the name of the prompt. The prompt can be up to 64 alphanumeric characters

    long.

    To change the system prompt:

    Step Mode Command Purpose

    1 (EV)# set prompt Change the system prompt to

    .

    Example:

    (EV)# set prompt VDSL

    (VDSL)#

    3 User management

    This chapter describes the user login authentication information. It describes the authentication of locally configured users and users that are configured on the RADIUS server.

    The chapter consists of the following sections:

    Understanding

    Default settings

    Configuring local users

    Configuring RADIUS client

    3.1 Understanding

    3.1.1 Default users

    There are two visible user accounts:

    admin, with Read/Write privileges

    guest, with Read Only privileges

    By default, both of these accounts have blank passwords. The names are not case sensitive. There is a third user account, but is not visible - non-configured user. This user is not present in the database and it just denotes the user with no account created on the system. Only users with Read/Write privileges can create or modify user accounts. The admin user account cannot be deleted, nor can its name or authentication list assignment be changed. This user thus always belongs to the defaultList authentication list You can only change the password for this user account.

    A user name can have a maximum of eight (8) characters. The name in not case sensitive. The valid characters can include dash (-) and underscore (_).

    A password can have a maximum of eight (8) alpha numeric characters and is case sensitive.

    3.1.2 User authentication

    The supported authentication methods are:

    Local the user's locally stored ID and password are used for authentication. RADIUS the user's ID and password are authenticated using the RADIUS server.

    Reject the user is never authenticated.

  • User guide (CLI) 9

    3.1.3 Remote authentication dial-in user service (RADIUS)

    The user authentication and accounting is an essential component of any Internet access architecture. In

    order to connect on to the network, the user is required to present security credentials (such as a

    username and password, or security certificate). Before the access to the network is permitted, security

    credentials are passed to a Network Access Server (NAS), which resides in the VDSL2 blade, then to a

    RADIUS server. The latter checks that the information is correct by using the authentication schemes like

    PAP, CHAP or EAP. If accepted, the RADIUS server will indicate to the NAS, the user is authorized to

    access the network, otherwise its authorization will be rejected. From the explanation, so far, is evident

    that the RADIUS server relies on a client-server model, with the PPP termination point as a RADIUS

    client (NAS), which passes user information to a designated RADIUS server, and then acts on the

    response.

    By means of RADIUS protocol, the RADIUS server may supply the NAS with additional parameters such

    as:

    The specific address to be assigned to the user,

    The address pool from which the user's IP should be chosen,

    The maximum length that the user may remain connected,

    An access list, priority queue or other restrictions on a user's access and

    L2TP parameters.

    The RADIUS protocol does not transmit passwords in cleartext between the NAS and RADIUS server

    (not even with PAP protocol). This transmission is made in the hidden form, using rather complex

    operation instead, which involves MD5 hashing and shared secret.

    The RADIUS protocol allows the vendor to add extensions to the basic protocol in order to meet its

    needs. For example, the L2TP parameters are optional.

    The accounting component is not supported.

    3.2 Default settings

    Table 3-1: Default RADIUS settings

    Feature Default Settings

    UDP port number for RADIUS server 1812

    Current RADIUS server IP Address N/A

    Number of configured RADIUS servers 0

    Number of retransmits when no response is

    received from RADIUS server

    2

    Timeout duration 10

    3.3 Configuring local users

    3.3.1 Adding a user

    This operation adds a new user account. The account can be up to eight characters long.

    You can use alphanumeric characters and two special characters, dash (-) and underscore (_).The user

    name is case sensitive The newly added user will have read-only access.

    Note: To delete the user account, use the no form of the command. Note that admin user account cannot be deleted.

  • 10 User guide (CLI)

    To add a new user account:

    Step Mode Command Purpose

    1 (EV) # configure Enter configuration mode.

    2 (EV)(Config) # users name Create a user

    account.

    Example:

    (EV)# configure

    (EV)(Config)# users name guest1

    (EV)(Config)# exit

    (EV)# show users

    User Name User Access Mode

    ---------- ----------------

    admin Read/Write

    guest1 Read Only

    3.3.2 Setting the user password

    When you add a new user account, the password for the account is blank (no password). This operation enables you to set or change the password for a user account. A password can have a maximum of eight (8) alphanumeric characters. The password is case sensitive. When you change a password, you will be asked to provide the old password. If a password was blank, just ENTER.

    Note: To set the password to blank (no password), use the no form of the command.

    To set the user password:

    Step Mode Command Purpose

    1 (EV) # configure Enter configuration mode.

    2 (EV)(Config) # users passwd Create a profile

    with parameter values

    adopted from the default

    profile. Use the option from

    , to create a

    profile with values adopted

    from the specified profile.

    Example:

    (EV)# configure

    (EV)(Config)# users passwd guest1

    Enter old password:

    Enter new password: ******